US accuses Russian of helping Kremlin hack Ukraine’s state computer systems

Avatar

A 22-year-old Russian national is facing charges in the U.S. for allegedly helping Moscow’s military intelligence to hack into Ukraine’s computer systems prior to Russia’s invasion, and later targeting Kyiv’s allies, including the U.S.

According to the Department of Justice, Russian citizen Amin Stigal used malware known as WhisperGate to help Russia’s military intelligence, the GRU, to attack and destroy dozens of Ukrainian government entities’ computer systems in advance of the Russian invasion in 2022. Stigal remains at large. 

WhisperGate is a wiper masquerading as ransomware, which has some similarities to the NotPetya wiper that attacked Ukrainian businesses in 2017. WhisperGate was used by Russia-linked hackers to hit multiple Ukrainian government computers and websites in January 2022. 

“WhisperGate was actually a cyberweapon designed to completely destroy the target computer and related data,” an indictment said.

During the attack on Ukrainian targets, hackers compromised several of the targeted Ukrainian computer systems, exfiltrated sensitive data, including patient health records, and defaced the websites. They also offered the hacked data for sale on the internet.

“The effort was aimed at sowing concern among the broader Ukrainian population regarding the safety of government systems and data,” the Justice Department said. 

The same hackers were also allegedly responsible for an attack on “the transportation infrastructure of a Central European country that was supporting Ukraine.” They also probed computers belonging to a federal government agency in Maryland, according to the indictment.

If convicted, Stigal could face a maximum penalty of five years in prison.

“The Justice Department will continue to stand with Ukraine on every front in its fight against Russia’s war of aggression, including by holding accountable those who support Russia’s malicious cyber activity,” said U.S. Attorney General Merrick B. Garland.

News BriefsGovernmentNation-stateNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Suspected Chinese gov’t hackers used ransomware as cover in attacks on Brazil presidency, Indian health org

Next Post

EU blames ‘clerical error’ after misattributing hacks to wrong Russian spy agency

Related Posts

Identity: The New Cybersecurity Battleground

The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but also brought about complexities that pose significant security threats. At the core of these vulnerabilities lies Identity—the gateway to enterprise security and the number one attack vector
Avatar
Read More

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. "An Authentication Bypass Using an Alternate Path or
Avatar
Read More

Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. "Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution," Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical write-up of the campaign. The
Avatar
Read More